• Body-worn cameras associated with increased assaults against police

    Preliminary results from eight U.K. and U.S. police forces reveal rates of assault against officers are 15 percent higher when they use body-worn cameras. The latest findings, from one of the largest randomized-controlled trials in criminal justice research, highlight the need for cameras to be kept on and recording at all stages of police-public interaction – not just when an individual officer deems it necessary – if police use-of-force and assaults against police are to be reduced.

  • France to employ anti-drone technology to protect Euro 2016 soccer games

    France will employ anti-drone technology to interfere with and take control of any flying machines breaching strict no-fly zones over stadiums where the games of the 2016 European Soccer Championship will be played. The technology is part of broad and unprecedented security measures taken to secure Europe’s biggest sports event. French security agencies have been training for some time for the possibility of drones used to disperse chemical agents over crowds.

  • Telephone metadata can reveal surprisingly sensitive personal information

    Most people might not give telephone metadata – the numbers you dial, the length of your calls – a second thought. Some government officials probably view it as similarly trivial, which is why this information can be obtained without a warrant. Researchers show, however, that telephone metadata – information about calls and text messages, such as time and length – can alone reveal a surprising amount of personal detail. The work could help inform future policies for government surveillance and consumer data privacy.

  • Active shooter exercise evaluates tactics, technologies

    The New York Police Department (NYPD), the Fire Department of New York (FDNY), and the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) took part in an active shooter exercise early Sunday at a Brooklyn high school to evaluate tactics and technologies for responding to and containing rapidly escalating shooting incidents.

  • Harnessing thousands of network cameras for public safety

    Researchers have developed a prototype system that could allow law enforcement and public safety agencies to tap into thousands of cameras located in numerous venues including parking garages, college campuses, national parks and highways. In addition to applications in law enforcement, the system can be used to quickly find damage, plan rescues, and other operations during natural disasters.

  • FBI does not know how the $1m iPhone hack works

    The  FBI does not know how the hack which was used to unlock the San Bernardino terrorist’s iPhone 5C works, even though the agency paid about $1 million for the technique. The identity of the hackers who sold the technique to the agency is a closely guarded secret, and the FBI director himself does not know who they are.

  • Snowden revelations led to “chilling effect” on pursuit of knowledge: Study

    National Security Agency (NSA) whistleblower Edward Snowden’s 2013 mass surveillance revelations caused a drop in website browsing, particularly in internet searches for terms associated with extremism, an example of the most direct evidence yet that the spying operations exposed in the leak had a “chilling effect” on the lawful pursuit of information, an impending report has found.

  • Hair analysis is flawed as a forensic technique

    Since 1989, seventy-four people who were convicted of serious crimes, in large part due to microscopic hair comparisons, were later exonerated by post-conviction DNA analysis. A new article highlights the statistical failings of microscopic hair analysis in criminal investigations, noting that more than twenty characteristics can be used to describe or identify a single hair, but many are subjective.

  • Privacy advocacy groups ask NSA to halt changes to data sharing rules

    More than thirty organizations sent a letter to the Director of National Intelligence and the Director of the National Security Agency, urging them to halt reported changes to the rules governing when and how the NSA can share the data it collects through overseas surveillance.

  • Four questions Belgians should ask about the Patriot Act

    The Paris and Brussels terrorist attacks added a sense of urgency to calls for Belgium to enact its own counterterrorism bill. It is a call the French government has already answered. Increased use of surveillance is a worldwide trend. There is no guarantee, however, that even with the most sophisticated surveillance technology out there today, passing a bill or law to collect private information on citizens will protect us from terrorist threats and violence. Even more vexing: the nature of intelligence gathering means we may never know exactly how many attacks have been prevented by the Patriot Act, the French surveillance law — or a similar law that Belgium may soon pass.

  • Flexible security solution makes life difficult for burglars

    Ideally, homeowners want to be warned if a burglar sneaks onto their property, and farmers want to know if horses or sheep are no longer in the paddock or field they were left grazing in. Experimental physicists at Saarland University have developed a flexible security solution that can be used in gardens, driveways, business premises, or on grazing land and in woodland.

  • FBI cracks terrorists’ iPhone without Apple's help

    The Justice Department on Monday asked a court to withdraw the government’s request that the court order Apple to help the FBI gain access to the encrypted iPhone used by the San Bernardino terrorists. The Justice Department filed the request after the FBI had successfully accessed data stored on an encrypted iPhone. The FBI wanted the court to compel Apple to relax the 10-attempt limit, which is part of the encryption system which comes with the device. If there are more than ten attempts to guess the password, the phone locks forever and all the data on it is wiped out. The FBI argued that its computers, using brute-force, would be able to break the phone’s password, but that it would take more than ten attempts.

  • FBI may be able to break into San Bernardino terrorist’s phone without Apple’s help

    Magistrate Judge Sheri Pym has postponed until 5 April a court hearing about the FBI’s request that the court would order Apple to unlock the phone of one of the San Bernardino terrorists. The FBI asked the judge to postpone the hearing after the agency said it may have found a way to unlock the phone without Apple’s help.

  • Snowden dismisses FBI's claim it cannot unlock San Bernardino killers’ iPhone

    Edward Snowden has joined the debate over the FBI’s attempt to force Apple to help it unlock the iPhone 5C used by one of the San Bernardino terrorists. The FBI says that only Apple can deactivate certain passcode protections on the iPhone — for example, the 10-attempt limit, which makes the phone permanently inaccessible after ten attempts to guess the password —which would allow law enforcement to guess the passcode by using brute-force.

  • Apple versus FBI: All Writs Act’s age should not bar its use

    A federal magistrate judge in California has issued a warrant ordering Apple to assist the FBI in accessing data on an iPhone used by a suspect in the December 2015 San Bernardino mass shooting. Apple’s public refusal to comply with the order – and its motion asking a judge to reverse the order – have set up a legal showdown that has captivated the technology world. It’s hard not to think that marketing and economics are at least somewhat behind Apple’s actions. But my guess is most people understand that the FBI would not be getting into their phones without a probable cause search warrant. In addition, I would think Apple would not want to have a market composed of people who want to use iPhones for dangerous and illegal activity. The company might actually lose more future customers because of its uncooperative attitude than it would ever lose by helping the government by complying with a court order.